
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments
Imran Imran, Faisal Jamil, Do‐Hyeun Kim
Sustainability (2021) Vol. 13, Iss. 18, pp. 10057-10057
Open Access | Times Cited: 56
Imran Imran, Faisal Jamil, Do‐Hyeun Kim
Sustainability (2021) Vol. 13, Iss. 18, pp. 10057-10057
Open Access | Times Cited: 56
Showing 26-50 of 56 citing articles:
Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier
C. Pradeepthi, B. Uma Maheswari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 40147-40178
Closed Access | Times Cited: 3
C. Pradeepthi, B. Uma Maheswari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 40147-40178
Closed Access | Times Cited: 3
Towards Potential Content-Based Features Evaluation to Tackle Meaningful Citations
Faiza Qayyum, Harun Jamil, Faisal Jamil, et al.
Symmetry (2021) Vol. 13, Iss. 10, pp. 1973-1973
Open Access | Times Cited: 6
Faiza Qayyum, Harun Jamil, Faisal Jamil, et al.
Symmetry (2021) Vol. 13, Iss. 10, pp. 1973-1973
Open Access | Times Cited: 6
A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM
Zhenxiang He, Xunxi Wang, Chun-Wei Li
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 845-871
Open Access | Times Cited: 2
Zhenxiang He, Xunxi Wang, Chun-Wei Li
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 845-871
Open Access | Times Cited: 2
Intrusion Detection System: A Comparative Study of Machine Learning-based IDS
Amit Kumar Singh, Jay Prakash, Gaurav Kumar
Research Square (Research Square) (2022)
Open Access | Times Cited: 3
Amit Kumar Singh, Jay Prakash, Gaurav Kumar
Research Square (Research Square) (2022)
Open Access | Times Cited: 3
An Effective Classifier Model for Imbalanced Network Attack Data
G黵can 莈tin
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 4519-4539
Open Access | Times Cited: 3
G黵can 莈tin
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 4519-4539
Open Access | Times Cited: 3
Using Machine Learning on Testing IoT Applications: a systematic mapping
Lavínia Matoso Freitas, Valéria Lelli
(2022), pp. 348-358
Closed Access | Times Cited: 3
Lavínia Matoso Freitas, Valéria Lelli
(2022), pp. 348-358
Closed Access | Times Cited: 3
A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection
Lijian Liu, Jinguo Li
(2022)
Closed Access | Times Cited: 3
Lijian Liu, Jinguo Li
(2022)
Closed Access | Times Cited: 3
Towards an Efficient DDoS Attack Detection in SDN: An Approach with CNN-GRU Fusion
Konda Srikar Goud, Giduturi Srinivasa Rao
(2024), pp. 1-10
Closed Access
Konda Srikar Goud, Giduturi Srinivasa Rao
(2024), pp. 1-10
Closed Access
Using Hybrid Deep Learning Approach to Enhanced Network Intrusion Detection with Spatial-Temporal Feature Integration
Jane Jaleel Stephan, Mohammed Mohammed
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 4, pp. 1619-1628
Open Access
Jane Jaleel Stephan, Mohammed Mohammed
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 4, pp. 1619-1628
Open Access
A Lightweight Convolutional Neural Network based network intrusion detection and classification method for Social Internet of Things
G. Murugesan, P. Maheswaravenkatesh
Research Square (Research Square) (2024)
Open Access
G. Murugesan, P. Maheswaravenkatesh
Research Square (Research Square) (2024)
Open Access
ALRN-RCS: Advanced Approach to Network Intrusion Detection Using Attention Long-Term Recurrent Networks and Chaotic Optimization
N. P. Ponnuviji, E. Nirmala, Mary Harin Fernandez F, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8006-8017
Closed Access
N. P. Ponnuviji, E. Nirmala, Mary Harin Fernandez F, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8006-8017
Closed Access
Research on Situational Awareness of Network Security Based on Machine Learning
Hui Duan
(2024) Vol. 40, pp. 947-951
Closed Access
Hui Duan
(2024) Vol. 40, pp. 947-951
Closed Access
Automated anomaly detection for categorical data by repurposing a form filling recommender system
Hichem Belgacem, Xiaochen Li, Domenico Bianculli, et al.
Journal of Data and Information Quality (2024)
Closed Access
Hichem Belgacem, Xiaochen Li, Domenico Bianculli, et al.
Journal of Data and Information Quality (2024)
Closed Access
RoCC framework for anomaly detection in IoT healthcare data
S. Subha, J.G.R. Sathiaseelan
AIP conference proceedings (2024) Vol. 3203, pp. 030042-030042
Closed Access
S. Subha, J.G.R. Sathiaseelan
AIP conference proceedings (2024) Vol. 3203, pp. 030042-030042
Closed Access
Deep Anomaly Detection: A Linear One-Class SVM Approach for High-Dimensional and Large-Scale Data
K. Suresh, K. Jayasakthi Velmurugan, R.G. Vidhya, et al.
Applied Soft Computing (2024) Vol. 167, pp. 112369-112369
Closed Access
K. Suresh, K. Jayasakthi Velmurugan, R.G. Vidhya, et al.
Applied Soft Computing (2024) Vol. 167, pp. 112369-112369
Closed Access
Enhancing Multiclass Network Intrusion Detection Systems Using Continuous Wavelet Transform on Network Traffic
Abdulaziz A. Alsulami, Badraddin Alturki
Data & Metadata (2024) Vol. 4, pp. 474-474
Closed Access
Abdulaziz A. Alsulami, Badraddin Alturki
Data & Metadata (2024) Vol. 4, pp. 474-474
Closed Access
Mobile Adhoc Networks and Networking–An Overview of Existing Intrusion Prevention Techniques and Predictive Intrusion Prevention
Michael Hosein, Jedidiah Aqui
Global Journal of Computer Science and Technology (2023), pp. 9-15
Open Access | Times Cited: 1
Michael Hosein, Jedidiah Aqui
Global Journal of Computer Science and Technology (2023), pp. 9-15
Open Access | Times Cited: 1
Modelling mechanisms for measurable and detection based on artificial intelligence
Raghad Abdul Hadi Abdul Qader, Marwa Jassim Mohammad
IAES International Journal of Artificial Intelligence (2023) Vol. 12, Iss. 4, pp. 2042-2042
Open Access | Times Cited: 1
Raghad Abdul Hadi Abdul Qader, Marwa Jassim Mohammad
IAES International Journal of Artificial Intelligence (2023) Vol. 12, Iss. 4, pp. 2042-2042
Open Access | Times Cited: 1
Hybrid CNN+LSTM Deep Learning Model for Intrusions Detection Over IoT Environment
Thamraj Narendra Ghorsad, Amol Zade
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10s, pp. 01-11
Open Access | Times Cited: 1
Thamraj Narendra Ghorsad, Amol Zade
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10s, pp. 01-11
Open Access | Times Cited: 1
Intrusion Detection System Model for IoT Networks Using Ensemble Learning
Umaira Ahad, Yashwant Singh, Pooja Anand, et al.
Journal of Interconnection Networks (2022) Vol. 22, Iss. 03
Closed Access | Times Cited: 2
Umaira Ahad, Yashwant Singh, Pooja Anand, et al.
Journal of Interconnection Networks (2022) Vol. 22, Iss. 03
Closed Access | Times Cited: 2
Intelligent Material Data Preparation Mechanism Based on Ensemble Learning for AI‐Based Ceramic Material Analysis
Imran Imran, Naeem Iqbal, Do‐Hyeun Kim
Advanced Theory and Simulations (2022) Vol. 5, Iss. 11
Closed Access | Times Cited: 2
Imran Imran, Naeem Iqbal, Do‐Hyeun Kim
Advanced Theory and Simulations (2022) Vol. 5, Iss. 11
Closed Access | Times Cited: 2
Securing Health Care Data through Blockchain enabled Collaborative Machine Learning
C. U. Om Kumar, G Sudhakaran, Veerasamy Balaji, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
C. U. Om Kumar, G Sudhakaran, Veerasamy Balaji, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Classifier Selection for an Ensemble of Network Traffic Analysis Machine Learning Models
Evita Roponena, Inese Poļaka
(2022) Vol. 11, pp. 1-6
Closed Access | Times Cited: 1
Evita Roponena, Inese Poļaka
(2022) Vol. 11, pp. 1-6
Closed Access | Times Cited: 1
Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning
Junzhou Li, Qianhui Sun, Feixian Sun
Data Science Journal (2023) Vol. 22
Open Access
Junzhou Li, Qianhui Sun, Feixian Sun
Data Science Journal (2023) Vol. 22
Open Access
Construction of a computer network fault analysis and intrusion detection system based on K-means clustering algorithm
Yao Chen
(2023), pp. 70-75
Closed Access
Yao Chen
(2023), pp. 70-75
Closed Access